CVE-2025-9152

WSO2 · WSO2 API Manager

A critical vulnerability has been identified in WSO2 API Manager, assigned a CVSS score of 9.8.

Executive summary

A critical vulnerability has been identified in WSO2 API Manager, assigned a CVSS score of 9.8. The flaw stems from missing security checks on a specific endpoint, allowing an unauthenticated remote attacker to register new applications without authorization. Successful exploitation could lead to a severe security breach, granting attackers unauthorized access to APIs and the sensitive data they protect.

Vulnerability

The vulnerability is an improper privilege management flaw located in the Dynamic Client Registration (DCR) endpoint for keymanager operations. This specific endpoint fails to perform required authentication and authorization checks, exposing a critical function to unauthenticated users. A remote attacker can exploit this by sending a specially crafted request to the DCR endpoint to register a new OAuth client, which would normally be a privileged operation. This malicious client could then be used to obtain access tokens and interact with APIs managed by the WSO2 instance, effectively bypassing the platform's core security model.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.8, posing a significant and immediate risk to the organization. Successful exploitation could result in a complete compromise of the API security layer, leading to severe consequences such as unauthorized access to sensitive customer or corporate data, modification or deletion of critical information, and abuse of backend services. The direct business impact includes potential data breaches, financial loss, reputational damage, and non-compliance with data protection regulations (e.g., GDPR, CCPA).

Remediation

Immediate Action: The primary remediation is to update the affected WSO2 API Manager instances to the latest version as recommended by the vendor. After applying the patch, it is essential to monitor for any ongoing or past exploitation attempts by thoroughly reviewing access logs for anomalous requests to the DCR endpoint.

Proactive Monitoring: Security teams should actively monitor WSO2 access logs for any unexpected requests to the /keymanager-operations DCR endpoint, particularly those originating from untrusted IP addresses. Monitor the API Manager administrative console for the creation of any unauthorized or suspicious OAuth applications. A sudden increase in client registration requests should trigger an immediate alert and investigation.

Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) or reverse proxy rule to restrict all external access to the vulnerable /keymanager-operations endpoint. Access should be limited strictly to trusted internal IP addresses that require this functionality. Enhanced logging and alerting should be configured for any access attempts to this endpoint.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the critical severity (CVSS 9.8) and the simplicity of exploitation, this vulnerability requires immediate attention. We strongly recommend that all organizations using the affected WSO2 API Manager products apply the vendor-supplied patches as an urgent priority. Although CVE-2025-9152 is not currently on the CISA KEV list, its characteristics make it a prime candidate for future inclusion. Organizations should treat this as an active threat and, if patching is delayed, immediately implement the recommended compensating controls while reviewing systems for any signs of prior compromise.